1 / 22

Privacy Rules!

Privacy Rules!. 1. What type of personal information is it okay to share with someone you don’t know?. A. Your name and telephone number only B. Your email address only, if it doesn’t include your name C. Minor details like the name of your school, and what your parents do for a living.

moira
Télécharger la présentation

Privacy Rules!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy Rules!

  2. 1. What type of personal information is it okay to share with someone you don’t know? A. Your name and telephone number only B. Your email address only, if it doesn’t include your name C. Minor details like the name of your school, and what your parents do for a living. D. You should never share ANY personal information with someone you don’t know.

  3. 1. What type of personal information is it okay to share with someone you don’t know? D. You should never share ANY personal information with someone you don’t know.

  4. 2. Which of these is an example of spam? A. A downloadable game that contains hidden software. B. An email message advertising a product that you don’t want C. A harmful program that destroys your hard drive D. An email joke forwarded to you by your Aunt Gladys.

  5. 2. Which of these is an example of spam? • B. An email message advertising a product that you don’t want

  6. 3. Which of the following is a fact about malware? A. It can cause your computer to run slower B. It’s a sneaky, mean way for people to advertise C. The government should make it illegal as soon as possible D. It’s totally useless- no one buys products advertised by malware.

  7. 3. Which of the following is a fact about malware? A. It can cause your computer to run slower

  8. 4. What should you do if you receive a suspicious looking email with an attachment? A. Open the attachment to see if it is from a friend B. Send a message back to the sender, asking him to remove you from his email list C. Forward the attachment to a friend who knows a lot about computers D. Delete it immediately

  9. 4. What should you do if you receive a suspicious looking email with an attachment? D. Delete it immediately

  10. 5. Why would an identity thief want to steal your information? A. To imitate you in chat rooms and on message boards B. To access your bank accounts, credit cards and other financial resources C. To send you emails advertising stuff you’d never want D. To send viruses out from your email account

  11. 5. Why would an identity thief want to steal your information? B. To access your bank accounts, credit cards and other financial resources

  12. 6. What type of information would be appropriate to post on a personal website? A. Comments about your teachers dressing habits B. Digital photos you don’t want your parents to see C. A review of a restaurant you visited D. Gossip about your classmates

  13. 6. What type of information would be appropriate to post on a personal website? C. A review of a restaurant you visited

  14. 7. Which of the following might be part of a site’s privacy policy? A. A software program that protects against spam and malware B. Downloadable games and apps C. A promise that the site won’t sell your information to other people. D. Information about how to acquire anti-virus software.

  15. 7. Which of the following might be part of a site’s privacy policy? C. A promise that the site won’t sell your information to other people.

  16. 8. What are these called? A. Viruses B. Pop up adds C. Spam D. Trojan horses

  17. 8. What are these called? B. Pop up adds

  18. 9. The law compels websites to post privacy issues. What does “compels” mean in this context? A. Persuades B. Asks C. Forbids D. Requires

  19. 9. The law compels websites to post privacy issues. What does “compels” mean in this context? D. Requires

  20. 10. What can you infer from the fact that scams and other illegal behavior are so common on the internet? A. There are no laws that regulate the internet B. Online criminals often use clever tactics to avoid detection C. Law enforcement officials aren’t aware of how much online crime there is D. Most internet users are criminals

  21. 10. What can you infer from the fact that scams and other illegal behavior are so common on the internet? B. Online criminals often use clever tactics to avoid detection

  22. Do now… Go to fifth grade, and click on Cybersmart link. Once on the site, click on Student Links, and then click on the triangle. Find the title of this lesson, and open its links. You will be given a website to look at. Find it on the list, click on it and answer the questions on the paper.

More Related